Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

dc.contributor.authorRanade, Priyanka
dc.contributor.authorPiplai, Aritran
dc.contributor.authorMittal, Sudip
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2021-03-16T17:10:32Z
dc.date.available2021-03-16T17:10:32Z
dc.description2021 International Joint Conference on Neural Networks (IJCNN), 18-22 July 2021, Shenzhen, China
dc.description.abstractCyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-Source Intelligence (OSINT) communities or on the Web to effect a data poisoning attack on these systems. Adversaries can use fake CTI examples as training input to subvert cyber defense systems, forcing the model to learn incorrect inputs to serve their malicious needs. In this paper, we automatically generate fake CTI text descriptions using transformers. We show that given an initial prompt sentence, a public language model like GPT-2 with fine-tuning, can generate plausible CTI text with the ability of corrupting cyber-defense systems. We utilize the generated fake CTI text to perform a data poisoning attack on a Cybersecurity Knowledge Graph (CKG) and a cybersecurity corpus. The poisoning attack introduced adverse impacts such as returning incorrect reasoning outputs, representation poisoning, and corruption of other dependent AI-based cyber defense systems. We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters. Based on the study, professional threat hunters were equally likely to consider our fake generated CTI as true.en_US
dc.description.sponsorshipThis work was supported by a U.S. Department of Defense grant, a gift from IBM research, and National Science Foundation grant #2025685. We would like to thank various cybersecurity professionals and threat hunters at US defense contractors that took part in our human evaluation studyen_US
dc.description.urihttps://ieeexplore.ieee.org/document/9534192en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.genrepreprints
dc.identifierdoi:10.13016/m2ound-iofz
dc.identifier.citationP. Ranade, A. Piplai, S. Mittal, A. Joshi and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models," 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-9, doi: 10.1109/IJCNN52387.2021.9534192.en_US
dc.identifier.urihttp://hdl.handle.net/11603/21188
dc.identifier.urihttps://doi.org/10.1109/IJCNN52387.2021.9534192
dc.language.isoen_USen_US
dc.publisherIEEE
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rights© 2021 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.*
dc.subjectUMBC Ebiquity Research Group
dc.titleGenerating Fake Cyber Threat Intelligence Using Transformer-Based Modelsen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2102.04351.pdf
Size:
1.27 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: